AZ-500 part2: Implement platform protection

Go to class
Write Review

Free Online Course: AZ-500 part2: Implement platform protection provided by Microsoft Learn is a comprehensive online course, which lasts for 6-7 hours worth of material. The course is taught in English and is free of charge.

Overview
    • Module 1: Prevent attacks before they get to your Azure solutions. Use the concepts of defense in depth and zero trust to secure Azure perimeter.
    • By the end of this module, you will be able to:

      • Define defense in depth
      • Protect your environment from denial-of-service attacks
      • Secure your solutions using firewalls and VPNs
      • Explore your end-to-end perimeter security configuration based on your security posture
    • Module 2: Use Azure network capabilities to secure your network and applications from external and internal attacks.
    • By the end of this module, you will be able to:

      • Deploy and configure network security groups to protect your Azure solutions
      • Configure and lockdown service endpoints and private links
      • Secure your applications with Application Gateway, Web App Firewall, and Front Door
      • Configure ExpressRoute to help protect your network traffic
    • Module 3: Learn to lock down the devices, virtual machines, and other components that run your applications in Azure.
    • By the end of this module, you will be able to:

      • Configure and deploy Endpoint Protection
      • Deploy a privileged access strategy for devices and privileged workstations
      • Secure your virtual machines and access to them
      • Deploy Windows Defender
      • Practice layered security by reviewing and implementing Security Center and Security Benchmarks
    • Module 4: Explore how to secure your applications running within containers and how to securely connect to them.
    • By the end of this module, you will be able to:

      • Define the available security tools for containers in Azure
      • Configure security settings for containers and Kubernetes services
      • Lock down network, storage, and identity resources connected to your containers
      • Deploy RBAC to control access to containers

Syllabus
    • Module 1: Implement perimeter security
      • Introduction
      • Define defense in depth
      • Explore virtual network security
      • Enable Distributed Denial of Service (DDoS) Protection
      • Configure a distributed denial of service protection implementation
      • Explore Azure Firewall features
      • Deploy an Azure Firewall implementation
      • Configure VPN forced tunneling
      • Create User Defined Routes and Network Virtual Appliances
      • Explore hub and spoke topology
      • Perform try-this exercises
      • Knowledge check
      • Summary
    • Module 2: Configure network security
      • Introduction
      • Explore Network Security Groups (NSG)
      • Deploy a Network Security Groups implementation
      • Create Application Security Groups
      • Enable service endpoints
      • Configure service endpoint services
      • Deploy private links
      • Implement an Azure application gateway
      • Deploy a web application firewall
      • Configure and manage Azure front door
      • Review ExpressRoute
      • Perform try-this exercises
      • Knowledge check
      • Summary
    • Module 3: Configure and manage host security
      • Introduction
      • Enable endpoint protection
      • Define a privileged access device strategy
      • Deploy privileged access workstations
      • Create virtual machine templates
      • Enable and secure remote access management
      • Configure update management
      • Deploy disk encryption
      • Deploy and configure Windows Defender
      • Explore Microsoft Defender for Cloud recommendations
      • Secure Azure workloads with Azure Security Benchmarks
      • Perform Try-This exercises
      • Knowledge check
      • Summary
    • Module 4: Enable Containers security
      • Introduction
      • Explore containers
      • Configure Azure Container Instances security​
      • Manage security for Azure Container Instances (ACI)​
      • Explore the Azure Container Registry (ACR)​
      • Enable Azure Container Registry authentication
      • Review Azure Kubernetes Service (AKS)​
      • Implement an Azure Kubernetes Service architecture​
      • Configure Azure Kubernetes Service networking​
      • Deploy Azure Kubernetes Service storage​
      • Secure authentication to Azure Kubernetes Service with Active Directory​
      • Manage access to Azure Kubernetes Service using Azure role-based access controls
      • Knowledge check
      • Summary